Security Education, Awareness and Training: SEAT from Theory to Practice
Autor Carl Roper, Dr. Lynn Fischer, Joseph A. Grauen Limba Engleză Paperback – 22 sep 2005
* Shows how to establish and integrate a structured, internally consistent and coherent program from the ground up
* Illustrates how to assess and analyze security program needs and audience and customize training accordingly
* Numerous Appendices to help the security manager justify security spending on training initiatives
Preț: 322.77 lei
Preț vechi: 406.68 lei
-21% Nou
Puncte Express: 484
Preț estimativ în valută:
61.79€ • 63.55$ • 51.26£
61.79€ • 63.55$ • 51.26£
Carte tipărită la comandă
Livrare economică 08-22 februarie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780750678032
ISBN-10: 0750678038
Pagini: 400
Dimensiuni: 152 x 229 x 22 mm
Greutate: 0.49 kg
Ediția:New.
Editura: ELSEVIER SCIENCE
ISBN-10: 0750678038
Pagini: 400
Dimensiuni: 152 x 229 x 22 mm
Greutate: 0.49 kg
Ediția:New.
Editura: ELSEVIER SCIENCE
Public țintă
CSO's and security managers, private security consultants, security trainers, security educators and course/program developers in the 2- and 4-year college market, private security training companies and academies.Cuprins
Chapter 1: Security Programs, Security Education, and This BookChapter 2: Starting with Some BasicsChapter 3: Goals, Objectives, and a ModelChapter 4: Performance Problem Solving: Figuring Out What's Going OnChapter 5: Security Education and the Employment Life CycleChapter 6: Motivation: Getting People to Do ThingsChapter 7: Motivation: Some Theories with Practical ApplicationsChapter 8: Planning an Awareness ProgramChapter 9: Promoting Informed Awareness: Program ImplementationChapter 10: Practical Exercise: Promoting an Informed AwarenessChapter 11: Training and Education: Going One Step BeyondChapter 12: Planning to Train: Reader ExerciseChapter 13: Moving Security Education into the Work EnvironmentChapter 14: How Not to Train: A Commonsense AlternativeChapter 15: Evaluating Security Education ProgramsChapter 16: Security Education in the Electronic AgeAppendicesIntroduction: Security Products and PresentationsA: Focus Group ProtocolB: Security PresentationsC: Security Articles: The Protection of InformationD: Security Articles: Espionage and the Theft of InformationE: Security Articles: Foreign Travel RisksF: Security Articles: The InternetG: Internet Security LinksH: Security Articles: General InterestI: Audiovisuals: Getting the Word Out to the Right Audience - The Right Way
Recenzii
"This book is, foremost, a study of people, and secondarily, a model for effective security training programs. This is a must-read for every security educator and instructor, and even some human resources professionals. The concepts presented here might just redefine how educators develop and teach their curriculums. Security Management